XVG

Verge

Currency
Price Low: High:
Market Cap
Market Volume
#Building chart...
Verge is a cryptocurrency.
Circulating Supply
Max Supply N/A

Technical Analysis

Historical Prices
Date
Price
Volume
Market Cap
#Buidling history data...
{{ e.date }}
{{ coin.name }} Exchanges
Exchange
Volume
Share
#Buidling exchanges data...
{{ e.name }}
No More Exchanges
External Review
i.e CIO at Kraken
Sentiment
Comments

5 of 8 user opinions

NC
Partner at Castle Island Ventures and Co-creator of Coinmetrics Source
Verge is/was a privacy coin that relied not on enhancing actual privacy at the blockchain level but rather by bolting Tor onto Bitcoin. It was heavily shilled on Twitter and Reddit last year, but the Verge Family has gone quiet recently. Development and social media activity all but ceased when Verge was repeatedly 51% attacked earlier this year. The culprit was its unnecessarily complex five hash function Proof-of-Work algorithm, which led to it being much, much easier to exploit.
RS
Lead Maintainer at Monero Source
So much for Verge XVG and their IP address privacy. Someone's publishing originating IP addresses for Verge transactions (not just general node IP addresses). Considering that IP address obfuscation is their single privacy claim, looks like they're toast.
JM
Software developer, founder of McAfee, CEO of MGT Capital Investments Inc. Source
I like Verge. Having difficulty acquiring it though.
EM
Partner at INB Source
Bitcoin gets a lot of flak for being extremely conservative about new code, but stuff like the Verge hack and the BCH 0-day massively validate their approach.
EG
Associate Professor of Computer Science at Cornell Source
Total train wreck on Verge involving a 51% attack and a botched fork.
NR
Software Engineer, Facebook Source
There are ways to be so unproductive it's better not to contribute. Privacy is like medicine or building bridges: someone can get hurt if you do it wrong or mislead.

Trust me, Verge is not helping anybody but themselves.
BF
CEO of Chainstone labs Source
Verge had multiple algos at once and all kinds of security issues.
CL
Creator of Litecoin Source
Verge mining is being exploited again. Someone has 51% attacked and taken over the Verge network again. Pornhub transactions are being reversed!

Most helpful opinions

CL

CL Charlie Lee Creator of Litecoin
Verge mining is being exploited again. Someone has 51% attacked and taken over the Verge network again. Pornhub transactions are being reversed!
BF

BF Bruce Fenton CEO of Chainstone labs
Verge had multiple algos at once and all kinds of security issues.
NR

NR Noah Ruderman Software Engineer, Facebook
There are ways to be so unproductive it's better not to contribute. Privacy is like medicine or building bridges: someone can get hurt if you do it wrong or mislead. Trust me, Verge is not helping anybody but themselves.
EG

EG Emin Gun Sirer Associate Professor of Computer Science at Cornell
Total train wreck on Verge involving a 51% attack and a botched fork.
EM

EM Eric Meltzer Partner at INB
Bitcoin gets a lot of flak for being extremely conservative about new code, but stuff like the Verge hack and the BCH 0-day massively validate their approach.
JM

JM John McAfee Software developer, founder of McAfee, CEO of MGT Capital Investments Inc.
I like Verge. Having difficulty acquiring it though.
RS

RS Riccardo Spagni Lead Maintainer at Monero
So much for Verge XVG and their IP address privacy. Someone's publishing originating IP addresses for Verge transactions (not just general node IP addresses). Considering that IP address obfuscation is their single privacy claim, looks like they're toast.
NC

NC Nic Carter Partner at Castle Island Ventures and Co-creator of Coinmetrics
Verge is/was a privacy coin that relied not on enhancing actual privacy at the blockchain level but rather by bolting Tor onto Bitcoin. It was heavily shilled on Twitter and Reddit last year, but the Verge Family has gone quiet recently. Development and social media activity all but ceased when Verge was repeatedly 51% attacked earlier this year. The culprit was its unnecessarily complex five hash function Proof-of-Work algorithm, which led to it being much, much easier to exploit.